CN116723506A - Method, system and storage medium for authenticating sensitive information through 5G message - Google Patents

Method, system and storage medium for authenticating sensitive information through 5G message Download PDF

Info

Publication number
CN116723506A
CN116723506A CN202211342483.4A CN202211342483A CN116723506A CN 116723506 A CN116723506 A CN 116723506A CN 202211342483 A CN202211342483 A CN 202211342483A CN 116723506 A CN116723506 A CN 116723506A
Authority
CN
China
Prior art keywords
authentication
message
server
user
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211342483.4A
Other languages
Chinese (zh)
Inventor
王斌
杨戉
盛振明
夏建明
颜凤辉
王欣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Telecom Digital Intelligence Technology Co Ltd
Original Assignee
China Telecom Digital Intelligence Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Telecom Digital Intelligence Technology Co Ltd filed Critical China Telecom Digital Intelligence Technology Co Ltd
Priority to CN202211342483.4A priority Critical patent/CN116723506A/en
Publication of CN116723506A publication Critical patent/CN116723506A/en
Pending legal-status Critical Current

Links

Classifications

    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Telephonic Communication Services (AREA)

Abstract

The application discloses a method for authenticating sensitive information through a 5G message, which utilizes the 5G message to transmit the sensitive information, authenticates the sensitive information in an operator authentication server and a third party authentication server, and comprises static information authentication, dynamic information authentication and remote authentication; the sensitive information does not flow into the service APP which initiates authentication, and the service APP only receives the authentication result. The application also discloses a system for authenticating the sensitive information through the 5G message, which comprises a 5G mobile phone, an APP server, an operator authentication server, a 5G message server and a third party authentication server; static information authentication and dynamic information authentication are performed in an operator authentication server, and remote authentication is performed in a third party authentication server. The authentication process is very safe, and the service APP is prevented from stealing and monitoring sensitive information; when the business APP relates to economic behaviors such as loans, the application can judge whether the user is puttee or not through dynamic information authentication, thereby ensuring the personal safety of the user.

Description

Method, system and storage medium for authenticating sensitive information through 5G message
Technical Field
The application relates to the field of mobile communication and information authentication, in particular to a method, a system and a storage medium for performing sensitive information authentication through a 5G message.
Background
Sensitive personal information includes biometric identification, religious beliefs, specific identities, medical health, financial accounts, track of whereabouts and personal information of minors less than fourteen years old, and once the sensitive personal information is revealed or illegally used, the sensitive personal information is liable to cause infringement of personality dignity of natural people or harm to personal and property safety. At present, mobile phone APP needs to perform sensitive personal information authentication under a large number of service scenes, if a user is required to shoot an identity card, the information on the front side and the back side of a bank card is uploaded, video information is collected to perform living examination, and the information is transmitted to a cloud APP server through the APP and then is transferred to a third party authentication server to perform authentication. But some APPs may save user sensitive personal information, even raw image, video, etc., for various purposes. An external hacker may steal the database by using the system vulnerability, and an internal employee may steal the database by using the management vulnerability and sell personal information of the user, so that the information of the user is revealed, and even serious problems such as fraud or illegal account opening of a bank card are caused.
Disclosure of Invention
Aiming at the defects in the prior art, the application provides a method, a system and a storage medium for authenticating sensitive information through a 5G message; all sensitive information is ensured not to flow into the APP, but to directly enter a highly-trusted operator authentication server through a 5G message, and under the permission of a user, whether the user behavior is abnormal or not is judged according to the dynamic data of the user as the basis of further authentication. Finally, the APP only needs to acquire an authentication result, and the follow-up service is guaranteed to be normally carried out.
In order to achieve the above purpose, the present application adopts the following technical scheme:
a method of sensitive information authentication via 5G messages, the method comprising the steps of:
s1: the APP server transmits the basic authentication information uploaded by the user to an authentication request interface of an operator authentication server, the authentication request interface checks whether the APP manufacturer and the operator have contracts, if so, the basic authentication information is transmitted to an authentication service module of the operator authentication server, and if not, the APP server returns information prompting errors;
s2: the authentication service module authenticates the basic authentication information, if the authentication is successful, the authentication service module constructs a 5G MAAP card message, an authentication request is sent to a 5G message server through a MAAP interface of an operator authentication server, and the 5G message server forwards the authentication request to a 5G message module of a user mobile phone to prompt the user to upload sensitive information for further authentication; if the authentication fails, the authentication service module informs the APP server of the authentication failure through the authentication request interface;
s3: the user uploads the sensitive information for further authentication to a 5G message server through a 5G message module of the mobile phone, and the 5G message server forwards the sensitive information to an authentication service module through a MAAP interface of an operator authentication server;
s4: the authentication service module judges whether remote authentication is needed according to the type of the authentication service, if not, the authentication service module carries out local authentication on an operator authentication server, and the authentication service module informs the authentication result to a user and a service APP; the authentication service module forwards the sensitive information to a third party authentication server for remote authentication, if necessary.
In order to optimize the technical scheme, the specific measures adopted further comprise:
further, in step S2, the basic authentication information includes a mobile phone number, a name and an incomplete identity card number, and the authentication service module performs authentication on the basic authentication information specifically as follows:
and the authentication service module invokes the user information from the user information database of the operator authentication server according to the mobile phone number of the user, and compares the name with the incomplete identity card number.
Further, in step S2, the sensitive information includes a photograph, a video, an identification card, a bank card, and a living body detection medium.
Further, in step S4, the local authentication includes the steps of:
s4.1: the authentication service module judges whether to perform static information authentication or dynamic information authentication according to the type of the authentication service; if static information authentication is performed, the step S4.2 is entered, and if dynamic information authentication is performed, the step S4.3 is entered;
s4.2: the authentication service module confirms the identity of the user through image and video inspection, the authentication service module forms a 5G message containing an authentication result, the 5G message is sent to a 5G message server through a MAAP interface, and the 5G message server forwards the 5G message containing the authentication result to a 5G message module on a mobile phone of the user; meanwhile, the authentication service module feeds an authentication result back to the APP server through the authentication request interface, and the APP server informs the service APP on the mobile phone of the user;
s4.3: the authentication service module generates a 5G MAAP card message, the 5G MAAP card message is sent to the 5G message server through the MAAP interface, the 5G message server forwards the 5G message to the 5G message module of the mobile phone, the user is inquired whether the operator is allowed to acquire the dynamic information of the user for security check, and the user sends the selection result to the authentication service module through the 5G message; if the user allows the operator to acquire the user dynamic information for security check, the step S4.4 is entered; if the user does not allow the operator to acquire the dynamic information of the user for security check, static information authentication is carried out;
s4.4: the authentication service module acquires user dynamic data from the user information database, judges whether the user behavior is abnormal, sends the result to the APP server through the authentication request interface, and the APP server feeds the result back to the service APP.
Further, in step S4, the remote authentication specifically includes:
the authentication service module forwards the sensitive information to a third party authentication server through a remote authentication interface of an operator authentication server, the third party authentication server authenticates the sensitive information, the result is fed back to the authentication service module through the remote authentication interface, the authentication service module feeds back the authentication result to an APP server through an authentication request interface, and the APP server informs a service APP on a mobile phone of a user.
The application also provides a system for authenticating the sensitive information through the 5G message, which comprises: the system comprises a 5G mobile phone, an APP server, an operator authentication server, a 5G message server and a third party authentication server;
the 5G mobile phone comprises a service APP and a 5G message module, and the service APP and the 5G message module are completely isolated; the service APP is used for collecting the name, the mobile phone number and the incomplete identity card number of the user and initiating an authentication request to an operator authentication server; the 5G message module is used for receiving a request for collecting sensitive information issued by the operator authentication server, sending the sensitive information uploaded by the user to the 5G message server, analyzing the authentication result and displaying the result to the 5G mobile phone terminal user;
the 5G message server comprises a data forwarding module and a MAAP module; for the uplink 5G message, the data forwarding module forwards the 5G message sent by the 5G message module in the 5G mobile phone to the MAAP module, and the MAAP module sends the 5G message to the operator authentication server; for the downlink 5G message, the operator authentication server sends the downlink message to the MAAP module, and the MAAP module sends the downlink message to a 5G message module in the 5G mobile phone;
the operator authentication server comprises an authentication request interface, an authentication service module, a MAAP interface, a user information database and a remote authentication interface; the authentication request interface receives an authentication request and basic authentication information sent by the APP server, checks whether an APP manufacturer and an operator have contracts, informs the authentication server to perform basic information authentication, and receives an authentication result to return to the APP server; the MAAP interface interacts with a MAAP module of the 5G message server to send and receive the 5G message;
the remote authentication interface sends a remote authentication request to the third party authentication server, receives the result of the remote authentication and feeds back the result to the authentication service module.
In order to optimize the technical scheme, the specific measures adopted further comprise:
further, the user information database comprises network entry registration information and dynamic data; the network access registration information comprises a name, a gender, an identity card number and an identity card photo; the dynamic data comprise whether the mobile phone is started up suddenly in different places after long-term shutdown, a user history position track and the current registered base station position of the user mobile phone.
Further, the authentication service module judges whether static information authentication, dynamic information authentication or remote authentication is required according to the authentication service type; if static information authentication is required, the authentication service module invokes network registration information from a user information database according to the mobile phone number of the user, compares the network registration information with the name and the incomplete identity card number input by the user in the APP, fails authentication if the network registration information does not accord with the name and the incomplete identity card number, and requires the user to upload the identity card photo and the living body check media through a 5G message and check if the network registration information does not accord with the name and the incomplete identity card number; if the dynamic information authentication is required, the authentication service module judges whether the user behavior is abnormal according to the dynamic data in the user information database under the condition that the user is allowed, and feeds back the result to the APP server; and if the remote authentication is required, the authentication service module calls a third party authentication server through a remote authentication interface to perform the remote authentication.
The present application also proposes a computer-readable storage medium storing a computer program that causes a computer to perform the method of sensitive information authentication via 5G messages as described above.
The beneficial effects of the application are as follows:
(1) The APP initiating authentication needs to sign contract with the operator in advance, and sensitive information used for authentication only passes through the 5G network of the operator, so that the APP cannot acquire the sensitive information of the user, and the sensitive information is difficult to attack and steal;
(2) For APP developers, the development cost is lower; on the APP server side, a plurality of banks or public security systems and other systems do not need to be connected, a third party interface does not need to be purchased, integration is not needed, and an authentication result can be obtained only through a simple HTTP interface with an operator; for the APP side, an image and video acquisition function is not required to be integrated;
(3) For the authentication of economic behaviors such as loans, by combining dynamic information stored by operators, whether the user is likely to have the risk of being forced to authenticate by being kidnapped to a remote position or the possibility of being decoy to a marketing organization is judged, and whether the user behaviors are abnormal can be judged to a certain extent.
Drawings
FIG. 1 is an overall flow chart of the present authentication method;
FIG. 2 is a schematic diagram of a typical 5G MAAP card message;
FIG. 3a is a diagram of a user interaction interface when initiating authentication to a user;
FIG. 3b is a diagram of a user interface showing authentication results;
FIG. 4 is a remote authentication flow chart;
FIG. 5 is a dynamic information authentication flow chart;
FIG. 6 is a schematic diagram of the authentication system;
FIG. 7 is a schematic diagram of a business APP versus 5G message module;
FIG. 8 is a schematic diagram of an attacker stealing information;
FIG. 9 is a block diagram of a 5G message server;
fig. 10 is a block diagram of an operator authentication server.
Detailed Description
The application will now be described in further detail with reference to the accompanying drawings.
In one embodiment, the present application proposes a method for authenticating sensitive information through a 5G message, and the overall flowchart of the method is shown in fig. 1, specifically including the following steps:
step 1: the service APP initiates authentication to the user, and requires the user to input basic authentication information such as a name, a mobile phone number and an incomplete identity card number, for example, the first three digits and the last four digits, and then the basic authentication information is uploaded to the APP server.
Step 2: the APP server transmits the basic authentication information to an authentication request interface of an operator authentication server, the authentication request interface checks whether the APP manufacturer and the operator have contracts, if yes, the APP server transmits the basic authentication information to an authentication service module, and if not, an error prompt is directly returned to the APP server.
Step 3: the authentication service module acquires user static information according to the user mobile phone number, compares the user static information with user input information, and if the user static information is in accordance with the user input information, the authentication is successful, and the step 4 is entered; if the authentication fails, the APP server is notified of the authentication failure through the authentication request interface.
Step 4: the authentication service module constructs a 5G MAAP card message, which contains APP information for initiating authentication, and information which needs to be uploaded by a user, such as an identity card, a front photo and a back photo of a bank card, and living body detection media (turning, nodding, reading a certain string of numbers and the like), and the information reaches the 5G message module of the mobile phone of the user through a MAAP interface and a 5G message server.
A typical 5G MAAP card message is shown in fig. 2. The 5G message supports the downlink uploading of information such as characters, images, voice, video, geographic positions and the like, and provides a sufficient technical means for sensitive information authentication; the MAAP system of the 5G message is similar to an enterprise public number or an industrial short message, but the approval is more strict, and provides a highly safe number identification guarantee, each number is provided with a specific service by a chatbot of an enterprise, such as 10000 represents China telecom, 10086 represents China Mobile, the numbers cannot be imitated, and the 5G message sent to the numbers by a user cannot be easily intercepted and eavesdropped; the 5G message is used without additionally installing APP, so that convenience of use of a user is ensured; the user has highly-trusted basic authentication information in operators as a reference, so that real-name authentication service can be provided for various external APP; in addition, some user dynamic information, such as the number use time, whether the mobile phone using the number is not started for a long time, whether the mobile phone using the number is not moved for a long time, the current position of the user and the like can be used as a further credibility reference, and further integrity and safety basis are provided for more sensitive authentication, such as financial loan service, under the condition of user agreement.
In this embodiment, the user uses the number of the chinese telecommunication to select the chinese telecommunication as the embodiment of the real-name authentication.
The china telecom sends 5G message to the user, prompting the sample APP to delegate the china telecom to perform real name authentication, so that the user selects whether to accept or not, as shown in fig. 3 a.
Step 5: after reading the 5G MAAP card message, the user shoots sensitive information for further authentication according to the regulations.
Step 6: the sensitive information is sent to the authentication service module through the 5G message server and the MAAP interface.
Step 7: the authentication service module confirms the identity of the user through image and video inspection.
Step 8: the authentication service module forms a 5G message containing the authentication result, and sends the 5G message to the 5G message server through the MAAP interface, the 5G message server forwards the 5G message to the user mobile phone 5G message module, and the 5G message module displays the authentication result to the user through the mobile phone, as shown in fig. 3 b.
Step 9: the authentication service module sends the authentication result to the APP server through the authentication request interface, and the APP server sends the authentication result to the APP on the mobile phone of the user.
When the authentication business relates to a database of a bank or public security, a third party authentication server is required to be used for remote authentication; a flowchart of the remote authentication is shown in fig. 4.
In this embodiment, taking a bank server as a third party authentication server as an example, the specific steps of remote authentication are as follows:
step 1: the authentication service module identifies a bank name and a card number on the bank card;
step 2: the authentication service module sends the user name, the identity card number, the bank name and the bank card number to the remote authentication interface;
step 3: the remote authentication interface sends relevant information to an authentication server of a corresponding bank according to the name of the bank, namely, the third party authentication server in fig. 4 performs authentication;
step 4: the third party authentication server returns an authentication result to the remote authentication interface;
step 5: the remote authentication interface returns an authentication result to the authentication service module;
the subsequent flow is the same as the static information authentication flow.
When financial services such as loans are involved, dynamic information authentication is also required to be combined; the flow chart of dynamic information authentication is shown in fig. 5, and the specific steps are as follows:
step 1: the authentication service module generates a 5G MAAP card message, inquires whether a user allows an operator to acquire dynamic information of the user for security check, and then reaches a 5G message module on the 5G mobile phone through a MAAP interface and a 5G message server;
step 2: the user selects permission or rejection, generates a 5G message containing the selection result, and reaches the authentication service module through the MAAP interface; if the user does not agree, the dynamic information authentication fails, and step 3 and step 4 are skipped;
step 3: if the user agrees, acquiring user dynamic information from a user information database;
step 4: and the authentication service module analyzes the returned user dynamic information and judges whether the user behavior is abnormal or not.
The subsequent flow is the same as the static information authentication flow.
In another embodiment, the present application proposes a system corresponding to a method for authenticating sensitive information through a 5G message, the overall structure of the system is shown in fig. 6, and the system includes: the system comprises a 5G mobile phone, an APP server, an operator authentication server, a 5G message server and a third party authentication server.
The 5G mobile phone comprises a service APP and a 5G message module, and the service APP and the 5G message module are completely isolated, as shown in fig. 7; the service APP is used for collecting the name, the mobile phone number and the incomplete identity card number of the user and initiating an authentication request to an operator authentication server; the 5G message module is used for receiving a request for collecting sensitive information issued by the operator authentication server, sending the sensitive information uploaded by the user to the 5G message server, analyzing the authentication result and displaying the result to the 5G mobile phone terminal user;
in the conventional authentication method, sensitive information flows into an APP database, and an external attacker can easily steal the sensitive information, as shown in fig. 8; in the authentication method, sensitive information of the user does not flow into the APP server, and the problem of information disclosure does not exist.
The structure of the 5G message server is shown in fig. 9, and comprises a data forwarding module and a MAAP module; the data forwarding module forwards the 5G message sent by the 5G message module to the MAAP module, and the MAAP module sends the 5G message to the operator authentication server.
The structure of the operator authentication server is shown in fig. 10, and includes an authentication request interface, an authentication service module, a MAAP interface, a user information database, and a remote authentication interface;
the authentication request interface receives an authentication request and basic authentication information sent by the APP server, checks whether an APP manufacturer and an operator have contracts, informs the authentication server to perform basic information authentication, and receives an authentication result to return to the APP server; the MAAP interface interacts with a MAAP module of the 5G message server to send and receive the 5G message;
the authentication service module judges whether static information authentication, dynamic information authentication or remote authentication is required according to the authentication service type; if static information authentication is required, the authentication service module invokes network registration information from a user information database according to the mobile phone number of the user, compares the network registration information with the name and the incomplete identity card number input by the user in the APP, fails authentication if the network registration information does not accord with the name and the incomplete identity card number, and requires the user to upload the identity card photo and the living body check media through a 5G message and check if the network registration information does not accord with the name and the incomplete identity card number; if the dynamic information authentication is required, the authentication service module judges whether the user behavior is abnormal according to the dynamic data in the user information database under the condition that the user is allowed, and feeds back the result to the APP server; if the remote authentication is needed, the authentication service module calls a third party authentication server through a remote authentication interface to carry out the remote authentication;
the user information database comprises network access registration information and dynamic data; the network access registration information comprises a name, a gender, an identity card number and an identity card photo; the dynamic data comprise whether the mobile phone is started up suddenly in different places after long-term shutdown, a user history position track and a current registered base station position of the user mobile phone;
the remote authentication interface sends a remote authentication request to the third party authentication server, receives the result of the remote authentication and feeds back the result to the authentication service module.
In another embodiment, the application proposes a computer-readable storage medium storing a computer program that causes a computer to perform the method of sensitive information authentication via 5G messages as described above.
In the disclosed embodiments, a computer storage medium may be a tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. The computer storage medium may include, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing. More specific examples of a computer storage medium would include one or more wire-based electrical connections, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
The above is only a preferred embodiment of the present application, and the protection scope of the present application is not limited to the above examples, and all technical solutions belonging to the concept of the present application belong to the protection scope of the present application. It should be noted that modifications and adaptations to the application without departing from the principles thereof are intended to be within the scope of the application as set forth in the following claims.

Claims (9)

1. A method for authenticating sensitive information via a 5G message, the method comprising the steps of:
s1: the APP server transmits the basic authentication information uploaded by the user to an authentication request interface of an operator authentication server, the authentication request interface checks whether the APP manufacturer and the operator have contracts, if so, the basic authentication information is transmitted to an authentication service module of the operator authentication server, and if not, the APP server returns information prompting errors;
s2: the authentication service module authenticates the basic authentication information, if the authentication is successful, the authentication service module constructs a 5G MAAP card message, an authentication request is sent to a 5G message server through a MAAP interface of an operator authentication server, and the 5G message server forwards the authentication request to a 5G message module of a user mobile phone to prompt the user to upload sensitive information for further authentication; if the authentication fails, the authentication service module informs the APP server of the authentication failure through the authentication request interface;
s3: the user uploads the sensitive information for further authentication to a 5G message server through a 5G message module of the mobile phone, and the 5G message server forwards the sensitive information to an authentication service module through a MAAP interface of an operator authentication server;
s4: the authentication service module judges whether remote authentication is needed according to the type of the authentication service, if not, the authentication service module carries out local authentication on an operator authentication server, and the authentication service module informs the authentication result to a user and a service APP; the authentication service module forwards the sensitive information to a third party authentication server for remote authentication, if necessary.
2. The method for sensitive information authentication via 5G messages as claimed in claim 1, wherein: in step S2, the basic authentication information includes a mobile phone number, a name and an incomplete identity card number, and the authentication service module authenticates the basic authentication information specifically as follows:
and the authentication service module invokes the user information from the user information database of the operator authentication server according to the mobile phone number of the user, and compares the name with the incomplete identity card number.
3. The method for sensitive information authentication via 5G messages as claimed in claim 1, wherein: in step S2, the sensitive information includes a photo, a video, an identification card, a bank card, and a living body detection medium.
4. The method for authenticating sensitive information via 5G messages according to claim 1, wherein in step S4, the local authentication comprises the steps of:
s4.1: the authentication service module judges whether to perform static information authentication or dynamic information authentication according to the type of the authentication service; if static information authentication is performed, the step S4.2 is entered, and if dynamic information authentication is performed, the step S4.3 is entered;
s4.2: the authentication service module confirms the identity of the user through image and video inspection, the authentication service module forms a 5G message containing an authentication result, the 5G message is sent to a 5G message server through a MAAP interface, and the 5G message server forwards the 5G message containing the authentication result to a 5G message module on a mobile phone of the user; meanwhile, the authentication service module feeds an authentication result back to the APP server through the authentication request interface, and the APP server informs the service APP on the mobile phone of the user;
s4.3: the authentication service module generates a 5G MAAP card message, the 5G MAAP card message is sent to the 5G message server through the MAAP interface, the 5G message server forwards the 5G message to the 5G message module of the mobile phone, the user is inquired whether the operator is allowed to acquire the dynamic information of the user for security check, and the user sends the selection result to the authentication service module through the 5G message; if the user allows the operator to acquire the user dynamic information for security check, the step S4.4 is entered; if the user does not allow the operator to acquire the dynamic information of the user for security check, static information authentication is carried out;
s4.4: the authentication service module acquires user dynamic data from the user information database, judges whether the user behavior is abnormal, sends the result to the APP server through the authentication request interface, and the APP server feeds the result back to the service APP.
5. The method for authenticating sensitive information via 5G messages according to claim 1, wherein in step S4, the remote authentication is specifically:
the authentication service module forwards the sensitive information to a third party authentication server through a remote authentication interface of an operator authentication server, the third party authentication server authenticates the sensitive information, the result is fed back to the authentication service module through the remote authentication interface, the authentication service module feeds back the authentication result to an APP server through an authentication request interface, and the APP server informs a service APP on a mobile phone of a user.
6. A system for sensitive information authentication via 5G messages, comprising: the system comprises a 5G mobile phone, an APP server, an operator authentication server, a 5G message server and a third party authentication server;
the 5G mobile phone comprises a service APP and a 5G message module, and the service APP and the 5G message module are completely isolated; the service APP is used for collecting the name, the mobile phone number and the incomplete identity card number of the user and initiating an authentication request to an operator authentication server; the 5G message module is used for receiving a request for collecting sensitive information issued by the operator authentication server, sending the sensitive information uploaded by the user to the 5G message server, analyzing the authentication result and displaying the result to the 5G mobile phone terminal user;
the 5G message server comprises a data forwarding module and a MAAP module; for the uplink 5G message, the data forwarding module forwards the 5G message sent by the 5G message module in the 5G mobile phone to the MAAP module, and the MAAP module sends the 5G message to the operator authentication server; for the downlink 5G message, the operator authentication server sends the downlink message to the MAAP module, and the MAAP module sends the downlink message to a 5G message module in the 5G mobile phone;
the operator authentication server comprises an authentication request interface, an authentication service module, a MAAP interface, a user information database and a remote authentication interface; the authentication request interface receives an authentication request and basic authentication information sent by the APP server, checks whether an APP manufacturer and an operator have contracts, informs the authentication server to perform basic information authentication, and receives an authentication result to return to the APP server; the MAAP interface interacts with a MAAP module of the 5G message server to send and receive the 5G message;
the remote authentication interface sends a remote authentication request to the third party authentication server, receives the result of the remote authentication and feeds back the result to the authentication service module.
7. The system for sensitive information authentication via 5G messages as recited in claim 6, wherein said user information database comprises network entry registration information and dynamic data; the network access registration information comprises a name, a gender, an identity card number and an identity card photo; the dynamic data comprise whether the mobile phone is started up suddenly in different places after long-term shutdown, a user history position track and the current registered base station position of the user mobile phone.
8. The system for performing sensitive information authentication through 5G messages according to claim 6, wherein the authentication service module determines whether static information authentication, dynamic information authentication or remote authentication is required according to an authentication service type; if static information authentication is required, the authentication service module invokes network registration information from a user information database according to the mobile phone number of the user, compares the network registration information with the name and the incomplete identity card number input by the user in the APP, fails authentication if the network registration information does not accord with the name and the incomplete identity card number, and requires the user to upload the identity card photo and the living body check media through a 5G message and check if the network registration information does not accord with the name and the incomplete identity card number; if the dynamic information authentication is required, the authentication service module judges whether the user behavior is abnormal according to the dynamic data in the user information database under the condition that the user is allowed, and feeds back the result to the APP server; and if the remote authentication is required, the authentication service module calls a third party authentication server through a remote authentication interface to perform the remote authentication.
9. A computer-readable storage medium, characterized by: a computer program is stored which causes a computer to perform the method of sensitive information authentication by means of a 5G message as claimed in any of claims 1-5.
CN202211342483.4A 2022-10-31 2022-10-31 Method, system and storage medium for authenticating sensitive information through 5G message Pending CN116723506A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211342483.4A CN116723506A (en) 2022-10-31 2022-10-31 Method, system and storage medium for authenticating sensitive information through 5G message

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211342483.4A CN116723506A (en) 2022-10-31 2022-10-31 Method, system and storage medium for authenticating sensitive information through 5G message

Publications (1)

Publication Number Publication Date
CN116723506A true CN116723506A (en) 2023-09-08

Family

ID=87866613

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211342483.4A Pending CN116723506A (en) 2022-10-31 2022-10-31 Method, system and storage medium for authenticating sensitive information through 5G message

Country Status (1)

Country Link
CN (1) CN116723506A (en)

Similar Documents

Publication Publication Date Title
US11563734B2 (en) System and method for authenticating called parties of individuals within a controlled environment
US10674009B1 (en) Validating automatic number identification data
US12081975B2 (en) Intelligent method for SIM-swap fraud detection and prevention
CN107800672B (en) Information verification method, electronic equipment, server and information verification system
CN109784031B (en) Account identity verification processing method and device
CN107729727B (en) Real-name authentication method and device for account
US9256724B2 (en) Method and system for authorizing an action at a site
WO2013135898A1 (en) Mobile phone takeover protection system and method
WO2012005653A1 (en) Secure user identification
CN110598383B (en) Method and device for removing account authority limit
US20190026446A1 (en) Method and system for creating a strong authentication for a user using a portable electronic device
US20210406909A1 (en) Authorizing transactions using negative pin messages
CN107241362B (en) Method and device for identifying identity of verification code input user
KR102151430B1 (en) Computing device for executing smart contact center service
CN107294981B (en) Authentication method and equipment
US12052239B2 (en) Systems and methods for authenticating of personal communications cross reference to related applications
CN116723506A (en) Method, system and storage medium for authenticating sensitive information through 5G message
US20160342996A1 (en) Two-factor authentication method
US10853816B1 (en) Systems and methods for authentication of an individual on a communications device
CN114710328A (en) Identity recognition processing method and device
CN107241318B (en) Account loss reporting method and device
US20190208410A1 (en) Systems, devices, and methods for managing communications of one or more computing devices
KR20240126081A (en) System of monitoring voice phishing using call data and method thereof
KR20240010122A (en) Method for providing secure identity verification service
CN114095230A (en) Data processing method and device, computer equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination